A typo: "Crypto-Binding TLS" ==> "Crypto-Binding TLV"

On Sun, Nov 1, 2020 at 11:42 PM Joseph Salowey <j...@salowey.net> wrote:

> The section 5 revision is rewritten to reflect handling of the case where
> no MSK is generated and text on handling the 0 MSK is moved from errata
> 5770.  this erratum could use more review.  Please comment on the list or
> in the PR.
>
> Section 4 PR - https://github.com/emu-wg/teap-errata/pull/12
> Section 5 PR - https://github.com/emu-wg/teap-errata/pull/11
>
>
> Errata ID: 5775 - https://www.rfc-editor.org/errata/eid5775
> Status: verified
> Type: Technical
> Revision:
>
> Section 4.2.13 Says:
>
> The Crypto-Binding TLV MUST be exchanged and verified before the
>  final Result TLV exchange, regardless of whether there is an inner
>  EAP method authentication or not.  It MUST be included with the
>  Intermediate-Result TLV to perform cryptographic binding after each
>  successful EAP method in a sequence of EAP methods, before proceeding
>  with another inner EAP method.  The Crypto-Binding TLV is valid only
>  if the following checks pass:
>
> It should say:
>
>    The Crypto-Binding TLV MUST be exchanged and verified before the
>    final Result TLV exchange, regardless of whether there is an inner
>    EAP method authentication or not. It MUST be included with each
>    successful Intermediate-Result TLV to perform cryptographic binding
>    after each EAP authentication or basic password method, before
>    proceeding with another authentication exchange.  If no MSK or EMSK
>    has been generated and a Crypto-Binding TLS is required then the MSK
>    Compound MAC field contains the MAC using keys generated according
>    to section 5.2. The Crypto-Binding TLV is valid only if the following
>    checks pass:
>
> Section 5.2 says:
>
>    The first step in these calculations is the generation of the base
>    compound key, IMCK[n] from the session_key_seed, and any session keys
>    derived from the successful execution of nth inner EAP methods.  The
>    inner EAP method(s) may provide Inner Method Session Keys (IMSKs),
>    IMSK1..IMSKn, corresponding to inner method 1 through n.
>
> It should say:
>
>    The first step in these calculations is the generation of the base
>    compound key, IMCK[j] from the session_key_seed, and any session keys
>    derived from the successful execution of jth inner EAP authentication
>    methods or basic password authentication. The inner EAP method(s) may
>    provide Inner Method Session Keys (IMSKs), IMSK1..IMSKn, corresponding
>    to inner method 1 through n.  When the jth exchange, such as a basic
>    password exchange, does not derive key material then a special 0 IMSK
>    is used as described below.
>
> Section 5.2 says:
>
>    If the ith inner method does not generate an EMSK or MSK, then IMSKi
>    is set to zero (e.g., MSKi = 32 octets of 0x00s).  If an inner method
>    fails, then it is not included in this calculation.
>
> It Should say:
>
>    If no inner EAP authentication method is run then no EMSK or MSK
>    will be generated (e.g. when basic password authentication
>    is used or when no inner method has been run and the crypto-binding TLV
>    for the Result-TLV needs to be generated).  In this case, IMSK[j]
>    is set to zero (i.e., MSK = 32 octets of 0x00s).  If an inner method
>    fails, then it is not included in this calculation.
>
> Section 5.4 Says
>
> TEAP authentication assures the Master Session Key (MSK) and Extended
>  Master Session Key (EMSK) output from the EAP method are the result
>  of all authentication conversations by generating an Intermediate
>  Compound Key (IMCK).  The IMCK is mutually derived by the peer and
>  the server as described in Section 5.2 by combining the MSKs from inner
>  EAP methods with key material from TEAP Phase 1. The resulting
>  MSK and EMSK are generated as part of the IMCKn key hierarchy as
>  follows:
>
> It should say:
>
>    TEAP authentication assures the Master Session Key (MSK) and Extended
>    Master Session Key (EMSK) output from the EAP method are the result
>    of all authentication conversations by generating an Intermediate
>    Compound Key (IMCK).  The IMCK is mutually derived by the peer and
>    the server as described in Section 5.2 by combining the IMSKs from inner
>    EAP authentication and basic password methods with key material from
>    TEAP Phase 1.  The resulting MSK and EMSK are generated as part of the
>    IMCK key hierarchy as follows:
>
> Notes:
>
> This revision clarifies handling cases when the 0 MSK is used because no
> key material is derived.
>
>
_______________________________________________
Emu mailing list
Emu@ietf.org
https://www.ietf.org/mailman/listinfo/emu

Reply via email to